diff --git a/docs/skopeo-copy.1.md b/docs/skopeo-copy.1.md index ff1e04d125..baee7df4bb 100644 --- a/docs/skopeo-copy.1.md +++ b/docs/skopeo-copy.1.md @@ -54,25 +54,25 @@ Path of the authentication file for the destination registry. Uses path given by **--decryption-key** _key[:passphrase]_ to be used for decryption of images. Key can point to keys and/or certificates. Decryption will be tried with all keys. If the key is protected by a passphrase, it is required to be passed in the argument and omitted otherwise. -**--src-creds** _username[:password]_ for accessing the source registry +**--src-creds** _username[:password]_ for accessing the source registry. -**--dest-compress** _bool-value_ Compress tarball image layers when saving to directory using the 'dir' transport. (default is same compression type as source) +**--dest-compress** _bool-value_ Compress tarball image layers when saving to directory using the 'dir' transport. (default is same compression type as source). -**--dest-oci-accept-uncompressed-layers** _bool-value_ Allow uncompressed image layers when saving to an OCI image using the 'oci' transport. (default is to compress things that aren't compressed) +**--dest-oci-accept-uncompressed-layers** _bool-value_ Allow uncompressed image layers when saving to an OCI image using the 'oci' transport. (default is to compress things that aren't compressed). -**--dest-creds** _username[:password]_ for accessing the destination registry +**--dest-creds** _username[:password]_ for accessing the destination registry. -**--src-cert-dir** _path_ Use certificates at _path_ (*.crt, *.cert, *.key) to connect to the source registry or daemon +**--src-cert-dir** _path_ Use certificates at _path_ (*.crt, *.cert, *.key) to connect to the source registry or daemon. **--src-no-creds** _bool-value_ Access the registry anonymously. -**--src-tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container source registry or daemon (defaults to true) +**--src-tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container source registry or daemon (defaults to true). -**--dest-cert-dir** _path_ Use certificates at _path_ (*.crt, *.cert, *.key) to connect to the destination registry or daemon +**--dest-cert-dir** _path_ Use certificates at _path_ (*.crt, *.cert, *.key) to connect to the destination registry or daemon. **--dest-no-creds** _bool-value_ Access the registry anonymously. -**--dest-tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container destination registry or daemon (defaults to true) +**--dest-tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container destination registry or daemon (defaults to true). **--src-daemon-host** _host_ Copy from docker daemon at _host_. If _host_ starts with `tcp://`, HTTPS is enabled by default. To use plain HTTP, use the form `http://` (default is `unix:///var/run/docker.sock`). @@ -84,9 +84,9 @@ Existing signatures, if any, are preserved as well. **--dest-compress-level** _format_ Specifies the compression level to use. The value is specific to the compression algorithm used, e.g. for zstd the accepted values are in the range 1-20 (inclusive), while for gzip it is 1-9 (inclusive). -**--src-registry-token** _Bearer token_ for accessing the source registry +**--src-registry-token** _Bearer token_ for accessing the source registry. -**--dest-registry-token** _Bearer token_ for accessing the destination registry +**--dest-registry-token** _Bearer token_ for accessing the destination registry. ## EXAMPLES diff --git a/docs/skopeo-delete.1.md b/docs/skopeo-delete.1.md index b77557c620..0b1dee03d7 100644 --- a/docs/skopeo-delete.1.md +++ b/docs/skopeo-delete.1.md @@ -24,17 +24,17 @@ $ docker exec -it registry /usr/bin/registry garbage-collect /etc/docker-distrib Path of the authentication file. Default is ${XDG_RUNTIME\_DIR}/containers/auth.json, which is set using `skopeo login`. If the authorization state is not found there, $HOME/.docker/config.json is checked, which is set using `docker login`. -**--creds** _username[:password]_ for accessing the registry +**--creds** _username[:password]_ for accessing the registry. -**--cert-dir** _path_ Use certificates at _path_ (*.crt, *.cert, *.key) to connect to the registry +**--cert-dir** _path_ Use certificates at _path_ (*.crt, *.cert, *.key) to connect to the registry. -**--tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container registries (defaults to true) +**--tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container registries (defaults to true). **--no-creds** _bool-value_ Access the registry anonymously. Additionally, the registry must allow deletions by setting `REGISTRY_STORAGE_DELETE_ENABLED=true` for the registry daemon. -**--registry-token** _Bearer token_ for accessing the registry +**--registry-token** _Bearer token_ for accessing the registry. ## EXAMPLES diff --git a/docs/skopeo-inspect.1.md b/docs/skopeo-inspect.1.md index eb954c3d32..0d152e7fc1 100644 --- a/docs/skopeo-inspect.1.md +++ b/docs/skopeo-inspect.1.md @@ -25,17 +25,17 @@ Return low-level information about _image-name_ in a registry Path of the authentication file. Default is ${XDG\_RUNTIME\_DIR}/containers/auth.json, which is set using `skopeo login`. If the authorization state is not found there, $HOME/.docker/config.json is checked, which is set using `docker login`. - **--creds** _username[:password]_ for accessing the registry + **--creds** _username[:password]_ for accessing the registry. - **--cert-dir** _path_ Use certificates at _path_ (\*.crt, \*.cert, \*.key) to connect to the registry + **--cert-dir** _path_ Use certificates at _path_ (\*.crt, \*.cert, \*.key) to connect to the registry. - **--retry-times** the number of times to retry, retry wait time will be exponentially increased based on the number of failed attempts + **--retry-times** the number of times to retry, retry wait time will be exponentially increased based on the number of failed attempts. - **--tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container registries (defaults to true) + **--tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container registries (defaults to true). **--no-creds** _bool-value_ Access the registry anonymously. - **--registry-token** _Bearer token_ for accessing the registry + **--registry-token** _Bearer token_ for accessing the registry. ## EXAMPLES diff --git a/docs/skopeo-list-tags.1.md b/docs/skopeo-list-tags.1.md index e5d88871c8..465c4ec048 100644 --- a/docs/skopeo-list-tags.1.md +++ b/docs/skopeo-list-tags.1.md @@ -15,15 +15,15 @@ Return a list of tags from _repository-name_ in a registry. Path of the authentication file. Default is ${XDG\_RUNTIME\_DIR}/containers/auth.json, which is set using `skopeo login`. If the authorization state is not found there, $HOME/.docker/config.json is checked, which is set using `docker login`. - **--creds** _username[:password]_ for accessing the registry + **--creds** _username[:password]_ for accessing the registry. - **--cert-dir** _path_ Use certificates at _path_ (\*.crt, \*.cert, \*.key) to connect to the registry + **--cert-dir** _path_ Use certificates at _path_ (\*.crt, \*.cert, \*.key) to connect to the registry. - **--tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container registries (defaults to true) + **--tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to container registries (defaults to true). **--no-creds** _bool-value_ Access the registry anonymously. - **--registry-token** _Bearer token_ for accessing the registry + **--registry-token** _Bearer token_ for accessing the registry. ## REPOSITORY NAMES diff --git a/docs/skopeo-sync.1.md b/docs/skopeo-sync.1.md index d0e624fa84..4e603feb03 100644 --- a/docs/skopeo-sync.1.md +++ b/docs/skopeo-sync.1.md @@ -71,9 +71,9 @@ Path of the authentication file for the destination registry. Uses path given by **--dest-tls-verify** _bool-value_ Require HTTPS and verify certificates when talking to a container destination registry or daemon (defaults to true). -**--src-registry-token** _Bearer token_ for accessing the source registry +**--src-registry-token** _Bearer token_ for accessing the source registry. -**--dest-registry-token** _Bearer token_ for accessing the destination registry +**--dest-registry-token** _Bearer token_ for accessing the destination registry. ## EXAMPLES